Esquema de segurança para agentes móveis em sistemas abertos

of Thesis presented to UFSC as a partial fulfillment of the requirements for the degree of Doctor in Electrical Engineering. SECURITY SCHEME FOR MOBILE AGENTS IN OPEN SYSTEMS Michelle Silva Wangham

[1]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[2]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[3]  Carl E. Landwehr,et al.  Computer security , 2001, International Journal of Information Security.

[4]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[5]  Fritz Hohl,et al.  Mole – Concepts of a mobile agent system , 1999, World Wide Web.

[6]  Dwaine E. Clarke,et al.  SPKI/SDSI HTTP Server / Certificate Chain Discovery in SPKI/SDSI , 2001 .

[7]  Danny B. Lange,et al.  Mobile Objects and Mobile Agents: The Future of Distributed Computing? , 1998, ECOOP.

[8]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[9]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[10]  R. Power CSI/FBI computer crime and security survey , 2001 .

[11]  Arthur C. Graesser,et al.  Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents , 1996, ATAL.

[12]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[13]  William Landi,et al.  Undecidability of static analysis , 1992, LOPL.

[14]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[15]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[16]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[17]  Ricardo J. Rabelo Trust Building In The Creation Of Virtual Enterprises In Mobile Agent-Based Architectures , 2003, PRO-VE.

[18]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[19]  John C. Knight,et al.  A security architecture for survivability mechanisms , 2001 .

[20]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[21]  Ricardo Dahab,et al.  Segurança de sistemas de agentes moveis , 2003 .

[22]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[23]  John K. Ousterhout,et al.  The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.

[24]  Thomas Magedanz,et al.  Mobile agents - enabling technology for active intelligent network implementation , 1998, IEEE Netw..

[25]  Alexander Morcos,et al.  A Java implementation of simple distributed security infrastructure , 1998 .

[26]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[27]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[28]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[29]  Tommy Thorn,et al.  Programming languages for mobile code , 1997 .

[30]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[31]  Pierangela Samarati,et al.  Authentication, access control, and audit , 1996, CSUR.

[32]  N. Asokan,et al.  Protecting the computation results of free-roaming agents , 2005, Personal Technologies.

[33]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[34]  George C. Necula,et al.  A Proof-Carrying Code Architecture for Java , 2000, CAV.

[35]  Carla Merkle Westphall,et al.  Um esquema de autorização para a segurança em sistemas distribuídos de larga escala , 2000 .

[36]  Atsuko Miyaji,et al.  Software Obfuscation on a Theoretical Basis and Its Implementation , 2003, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.

[37]  Todd Papaioannou,et al.  On the structuring of distributed systems : the argument for mobility , 2000 .

[38]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[39]  Anand R. Tripathi,et al.  Security in mobile agent systems , 1998 .

[40]  Giovanni Vigna,et al.  Understanding Code Mobility , 1998, IEEE Trans. Software Eng..

[41]  Antonio Corradi,et al.  A secure and open mobile agent programming environment , 1999, Proceedings. Fourth International Symposium on Autonomous Decentralized Systems. - Integration of Heterogeneous Systems -.

[42]  Pekka Nikander,et al.  Distributed Policy Management for JDK 1.2 , 1999, NDSS.

[43]  Volker Roth,et al.  On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.

[44]  Daniela Rus,et al.  Mobile Agents: Future Directions for Mobile Agent Research , 2002, IEEE Distributed Syst. Online.

[45]  Joann J. Ordille,et al.  When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.

[46]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[47]  Hamideh Afsarmanesh,et al.  Dynamic Virtual Organizations, or Not So Dynamic? , 2002, BASYS.

[48]  William M. Farmer,et al.  Security for Mobile Agents: Issues and Requirements , 1996 .

[49]  Antonio Corradi,et al.  Mobile Agents Integrity for Electronic Commerce Applications , 1999, Inf. Syst..

[50]  Anand R. Tripathi,et al.  Experiences and future challenges in mobile agent programming , 2001, Microprocess. Microsystems.

[51]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[52]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[53]  Rob Kling,et al.  Security and reliability , 1991 .

[54]  Warwick Ford,et al.  Computer communication security - principles, standard protocols and techniques , 2008 .

[55]  S. Garfinkel,et al.  Web security & commerce , 1997 .

[56]  Trent Jaeger,et al.  A Flexible Security System for Using Internet Content , 1997, IEEE Softw..

[57]  David Wong,et al.  Security and reliability in Concordia , 1999 .

[58]  George Coulouris,et al.  Distributed systems - concepts and design , 1988 .

[59]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[60]  A. Santin Teias de federações: uma abordagem baseada em cadeias de confiança para autenticação , autorização e navegação em sistemas de larga escala , 2004 .

[61]  Mary Campione,et al.  The Java tutorial , 1996 .

[62]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[63]  Refik Molva,et al.  A Distributed Access Control Model for Java , 2000, ESORICS.

[64]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[65]  George C. Necula,et al.  Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.

[66]  Pankaj Jalote,et al.  An Integrated Approach to Software Engineering , 1997, Undergraduate Texts in Computer Science.

[67]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[68]  Giovanni Vigna,et al.  Designing Distributed Applications with Mobile Code Paradigms , 1997, Proceedings of the (19th) International Conference on Software Engineering.

[69]  Emerson Ribeiro de Mello Redes de confiança em sistemas de objetos CORBA , 2003 .

[70]  Edward G. Amoroso,et al.  Fundamentals of computer security technology , 1994 .

[71]  Lars Rasmusson,et al.  Simulated social control for secure Internet commerce , 1996, NSPW '96.

[72]  Michelle S. Wangham,et al.  A Security Scheme for Mobile Agent Platforms in Large-Scale Systems , 2003, Communications and Multimedia Security.

[73]  Danny B. Lange,et al.  Mobile agents with Java: The Aglet API , 1998, World Wide Web.

[74]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[75]  Antonio Corradi,et al.  Security issues in mobile agent technology , 1999, Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems.

[76]  Luís Valente,et al.  Mobile agent security and Telescript , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.

[77]  Moti Yung,et al.  Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.

[78]  Thomas Magedanz,et al.  Intelligent agents: an emerging technology for next generation telecommunications? , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.